This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus of the CISSP eight security domains, steps of risk management, security frameworks and controls (e.g., NIST, CIA triad, OWASP), as well as common security threats, risks, and vulnerabilities. Additionally, learners are provided with an opportunity to explore and analyze SIEM data, use a playbook to respond to identified threats, risks, and vulnerabilities, and conduct a security audit.

4 days left: Discover new skills with 30% off courses from industry experts. Save now.


Play It Safe: Manage Security Risks
This course is part of Google Cybersecurity Professional Certificate

Instructor: Google Career Certificates
Top Instructor
583,033 already enrolled
Included with
(10,153 reviews)
What you'll learn
Identify the primary threats, risks, and vulnerabilities to business operations
Examine how organizations use security frameworks and controls to protect business operations
Define commonly used Security Information and Event Management (SIEM) tools
Use a playbook to respond to threats, risks, and vulnerabilities
Skills you'll gain
- Security Controls
- Information Assurance
- Threat Management
- Incident Response
- Security Management
- Continuous Monitoring
- Risk Analysis
- Cyber Risk
- Threat Detection
- Cybersecurity
- Risk Management
- Security Information and Event Management (SIEM)
- Compliance Auditing
- Vulnerability Management
- Information Systems Security
- Auditing
- Enterprise Security
Details to know

Add to your LinkedIn profile
15 assignments
See how employees at top companies are mastering in-demand skills

Build your Computer Security and Networks expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from Google

There are 4 modules in this course
This module explains the focus of CISSP鈥檚 eight security domains. Then, primary threats, risks, and vulnerabilities to business operations are identified and defined, along with a discussion of the threats, risks, and vulnerabilities entry-level security analysts focus on most. Additionally, NIST鈥檚 Risk Management Framework (RMF) is introduced.
What's included
10 videos5 readings3 assignments1 plugin
This module explains security frameworks and controls, along with the core components of the confidentiality, integrity, and availability (CIA) triad. They will also learn about Open Web Application Security Project, recently renamed Open Worldwide Application Security Project庐 (OWASP), security principles and security audits.
What's included
11 videos6 readings6 assignments1 plugin
This module will explore industry leading security information and event management (SIEM) tools that are used by security professionals to protect business operations. You'll learn how entry-level security analysts use SIEM dashboards as part of their every day work.
What's included
7 videos4 readings3 assignments1 plugin
This module discusses the purposes and common uses of playbooks. They鈥檒l also explore how cybersecurity professionals use playbooks to respond to identified threats, risks, and vulnerabilities.
What's included
7 videos6 readings3 assignments2 plugins
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Explore more from Computer Security and Networks
- Status: Free Trial
- Status: Free Trial
- Status: Free Trial
- Status: Free Trial
Board Infinity
Why people choose 糖心vlog官网观看 for their career




Learner reviews
10,153 reviews
- 5 stars
86.22%
- 4 stars
11.51%
- 3 stars
1.56%
- 2 stars
0.35%
- 1 star
0.34%
Showing 3 of 10153
Reviewed on Aug 3, 2023
Holistic coverage of foundational concepts of what security is and how it is practiced in the industry, industry frameworks, before overlaying with contextualised cyber security practices.
Reviewed on Sep 27, 2023
Everything is perfectly explained. The real life experience being shared is also crucial to the overall success of the course, as it helps eliminate fear, or myth about Cybersecurity field.
Reviewed on Feb 12, 2024
I very much enjoyed this class. My first internal audit and adding it to my portfolio was a great exercise and adding another certificate keeps me engaged and learning, curious, & motivated.

Open new doors with 糖心vlog官网观看 Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose 糖心vlog官网观看 for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you enroll in the course, you get access to all of the courses in the Certificate, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don鈥檛 give refunds, but you can cancel your subscription at any time. See our full refund policy.
More questions
Financial aid available,